SlideShare a Scribd company logo
Intro
AWS Cloud Security
2
▪ Cloud security at AWS is the highest priority. As an AWS customer,
you will benefit from a data center and network architecture built
to meet the requirements of the most security-sensitive
organizations.
▪ An advantage of the AWS cloud is that it allows customers to scale
and innovate, while maintaining a secure environment. Customers
pay only for the services they use, meaning that you can have the
security you need, but without the upfront expenses, and at a
lower cost than in an on-premises environment.
AWS Compliance & Security
3
▪ Security and Compliance is a shared responsibility between AWS and the
customer.
▪ This shared model can help relieve customer’s operational burden as AWS
operates, manages and controls the components from the host operating
system and virtualization layer down to the physical security of the facilities in
which the service operates.
▪ The customer assumes responsibility and management of the guest operating
system (including updates and security patches), other associated application
software as well as the configuration of the AWS provided security group
firewall.
▪ Customers should carefully consider the services they choose as their
responsibilities vary depending on the services used, the integration of those
services into their IT environment, and applicable laws and regulations.
▪ The nature of this shared responsibility also provides the flexibility and
customer control that permits the deployment. As shown in the chart below,
this differentiation of responsibility is commonly referred to as Security “of” the
Cloud versus Security “in” the Cloud.
AWS Compliance & Security
4
▪ AWS responsibility “Security of the Cloud” - AWS is responsible
for protecting the infrastructure that runs all of the services
offered in the AWS Cloud.This infrastructure is composed of the
hardware, software, networking, and facilities that runAWS Cloud
services.
▪ Customer responsibility “Security in the Cloud” – Customer
responsibility will be determined by the AWS Cloud services that a
customer selects.This determines the amount of configuration
work the customer must perform as part of their security
responsibilities. For example, services such as Amazon Elastic
Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud
(AmazonVPC), and Amazon S3 are categorized as Infrastructure as
a Service (IaaS) and, as such, require the customer to perform all of
the necessary security configuration and management tasks
AWS Compliance & Security
5
▪ AWS responsibility “Security of the Cloud” - AWS is responsible
for protecting the infrastructure that runs all of the services
offered in the AWS Cloud.This infrastructure is composed of the
hardware, software, networking, and facilities that runAWS Cloud
services.
▪ Customer responsibility “Security in the Cloud” – Customer
responsibility will be determined by the AWS Cloud services that a
customer selects.This determines the amount of configuration
work the customer must perform as part of their security
responsibilities. For example, services such as Amazon Elastic
Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud
(AmazonVPC), and Amazon S3 are categorized as Infrastructure as
a Service (IaaS) and, as such, require the customer to perform all of
the necessary security configuration and management tasks
AWS Compliance & Security
6
Shared Responsibility Model
AWS Compliance & Security
7
▪ Inherited Controls – Controls which a customer fully inherits from AWS.
– Physical and Environmental controls
▪ Shared Controls – Controls which apply to both the infrastructure layer and customer layers, but in
completely separate contexts or perspectives. In a shared control, AWS provides the requirements
for the infrastructure and the customer must provide their own control implementation within their
use of AWS services. Examples include:
– Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure,
but customers are responsible for patching their guest OS and applications.
– Configuration Management – AWS maintains the configuration of its infrastructure devices, but
a customer is responsible for configuring their own guest operating systems, databases, and
applications.
– Awareness &Training - AWS trains AWS employees, but a customer must train their own
employees.
▪ Customer Specific – Controls which are solely the responsibility of the customer based on the
application they are deploying within AWS services. Examples include:
– Service and Communications Protection or Zone Security which may require a customer to
route or zone data within specific security environments.
AWS WAF
8
▪ AWSWAF is a web application firewall that lets you monitor the
HTTP and HTTPS requests that are forwarded toAmazon
CloudFront or an Application Load Balancer.
▪ AWSWAF also lets you control access to your content.
▪ Based on conditions that you specify, such as the IP addresses
that requests originate from or the values of query strings,
CloudFront or an Application Load Balancer responds to requests
either with the requested content or with an HTTP 403 status
code (Forbidden).
▪ You also can configure CloudFront to return a custom error page
when a request is blocked.
AWS WAF Working
9
▪ You use AWS WAF to control how Amazon CloudFront or an Application
Load Balancer responds to web requests.You start by creating
conditions, rules, and web access control lists (web ACLs).You define
your conditions, combine your conditions into rules, and combine the
rules into a web ACL.
– Conditions
▪ Conditions define the basic characteristics that you want AWSWAF to watch for in web
requests
– Rules
▪ You combine conditions into rules to precisely target the requests that you want to
allow, block, or count. AWSWAF provides two types of rules
– Web ACLs
▪ After you combine your conditions into rules, you combine the rules into a web ACL.
This is where you define an action for each rule—allow, block, or count—and a default
action
– A default action
▪ The default action determines whetherAWSWAF allows or blocks a request that
doesn't match all the conditions in any of the rules in the web ACL.
AWS Shield
10
▪ AWS provides AWS Shield Standard and AWS Shield Advanced for
protection against DDoS attacks.
▪ AWS Shield Standard is automatically included at no extra cost
beyond what you already pay forAWSWAF and your other AWS
services.
▪ For added protection against DDoS attacks, AWS offersAWS
Shield Advanced.
▪ AWS Shield Advanced provides expanded DDoS attack protection
for yourAmazon EC2 instances, Elastic Load Balancing load
balancers, CloudFront distributions, and Route 53 hosted zones.
AWS Shield Working
11
▪ A distributed denial of service (DDoS) attack is an attack in which
multiple compromised systems attempt to flood a target, such as
a network or web application, with traffic. A DDoS attack can
prevent legitimate users from accessing a service and can cause
the system to crash due to the overwhelming traffic volume.
▪ AWS provides two levels of protection against DDoS attacks: AWS
Shield Standard and AWS Shield Advanced.
– AWS Shield Standard
– AWS Shield Advanced
AWS Shield Working
12
▪ AWS Shield Standard
– All AWS customers benefit from the automatic protections of AWS Shield
Standard, at no additional charge.
– AWS Shield Standard defends against most common, frequently occurring
network and transport layer DDoS attacks that target your web site or
applications.
– WhileAWS Shield Standard helps protect allAWS customers, you get
particular benefit if you are using Amazon CloudFront and Amazon Route 53.
– These services receive comprehensive availability protection against all
known infrastructure (Layer 3 and 4) attacks.
AWS Shield Working
13
▪ AWS Shield Advanced
– For higher levels of protection against attacks targeting your web
applications running on Amazon EC2, Elastic Load Balancing (ELB),
CloudFront, and Route 53 resources, you can subscribe to AWS Shield
Advanced.
– AWS ShieldAdvanced provides expanded DDoS attack protection for these
resources.
AWS Trusted Advisor
14
▪ Trusted Advisor provides advice about yourAWS Account in the
areas of:
– Cost Optimization
– FaultTolerance
– Performance
– Service Limits
– Security
It highlights potential problems with the way you use AWS.
AWS Inspector
15
▪ Amazon Inspector checks the configuration of EC2 instances. An
agent runs on EC2 instances and checks operating system
patches, known vulnerabilities, and common issues.
AWS Inspector vs Trusted
Advisor
16
▪ Trusted Advisor applies to the AWS account and AWS services
▪ Amazon Inspector applies to the content of multiple EC2
instances
AWS Inspector vs Trusted
Advisor
17
▪ Trusted Advisor applies to the AWS account and AWS services
▪ Amazon Inspector applies to the content of multiple EC2
instances
Summary
18
AWS Shared Security Responsibility Model

More Related Content

PDF
Aws+cloud+practitioner+exam+cram
PDF
AWS Control Tower
PDF
AWS Security Best Practices (March 2017)
PPTX
Cloud Security (AWS)
PDF
Datensicherheit mit AWS - AWS Security Web Day
PPTX
Aws security best practices
PPTX
Best Practices in Secure Cloud Migration
PDF
Meetup Protect from Ransomware Attacks
Aws+cloud+practitioner+exam+cram
AWS Control Tower
AWS Security Best Practices (March 2017)
Cloud Security (AWS)
Datensicherheit mit AWS - AWS Security Web Day
Aws security best practices
Best Practices in Secure Cloud Migration
Meetup Protect from Ransomware Attacks

What's hot (6)

PPTX
AWS Well Architected Framework
PDF
Enterprise Applications on AWS
KEY
AWS Security: A Practitioner's Perspective
PDF
What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...
PDF
Security best practices on AWS cloud
PDF
Serverless SecOps Automation on AWS at AWS UG Krakow, Poland
AWS Well Architected Framework
Enterprise Applications on AWS
AWS Security: A Practitioner's Perspective
What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...
Security best practices on AWS cloud
Serverless SecOps Automation on AWS at AWS UG Krakow, Poland
Ad

Similar to Security (20)

PPTX
Shared Responsibility Model.pptx
PPTX
CLOUD COMPUTING.pptx
PDF
Aws auditing security_checklist
PPTX
AWS Security and Compliance Presentation
PDF
Top 15 aws security interview questions
PPTX
awsppt.pptx
PPTX
Introduction to Amazon Web Services by i2k2 Networks
PPTX
Introduction to Amazon Web Services by i2k2 Networks
PDF
Overview oracle-e-business-suite-aws
PDF
Aws web-hosting-best-practices
PDF
Tcp security white paper
PDF
Introduction to AWS Services: Networking,_Security
PDF
Security and Compliance Better on AWS_John Hildebrandt
PDF
The AWS Shared Responsibility Model in Practice
PDF
aws_security_incident_response.pdf
PDF
Examview cloud security summary
PDF
Presentation on Introduction to Amazon Web Services
PDF
Cloud 101: Your Gateway to Computing Freedom With AWS
PPTX
Pitt Immersion Day Module 5 - security overview
PDF
1. aws security and compliance wwps pre-day sao paolo - markry
Shared Responsibility Model.pptx
CLOUD COMPUTING.pptx
Aws auditing security_checklist
AWS Security and Compliance Presentation
Top 15 aws security interview questions
awsppt.pptx
Introduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 Networks
Overview oracle-e-business-suite-aws
Aws web-hosting-best-practices
Tcp security white paper
Introduction to AWS Services: Networking,_Security
Security and Compliance Better on AWS_John Hildebrandt
The AWS Shared Responsibility Model in Practice
aws_security_incident_response.pdf
Examview cloud security summary
Presentation on Introduction to Amazon Web Services
Cloud 101: Your Gateway to Computing Freedom With AWS
Pitt Immersion Day Module 5 - security overview
1. aws security and compliance wwps pre-day sao paolo - markry
Ad

More from Parag Patil (17)

PPTX
Aws overview part 1(iam and storage services)
PPTX
Aws overview part 2(compute services)
PPTX
Aws object storage and cdn(s3, glacier and cloud front) part 1
PPTX
Billing & pricing
PPTX
Databases overview & concepts
PPTX
Spring boot-application
PPTX
Databases on aws part 2
PPTX
Aws object storage and cdn(s3, glacier and cloud front) part 2
PPTX
Development tools
PPTX
Cloud concepts-and-technologies
PPTX
Aws overview part 3(databases, dns and management services)
PPTX
Word press site
PPTX
Dynamo db
PPTX
Aws object storage and cdn(s3, glacier and cloud front) part 3
PPTX
Databases on aws part 1
PPTX
Elastic beanstalk
PPTX
Identity access management (iam)
Aws overview part 1(iam and storage services)
Aws overview part 2(compute services)
Aws object storage and cdn(s3, glacier and cloud front) part 1
Billing & pricing
Databases overview & concepts
Spring boot-application
Databases on aws part 2
Aws object storage and cdn(s3, glacier and cloud front) part 2
Development tools
Cloud concepts-and-technologies
Aws overview part 3(databases, dns and management services)
Word press site
Dynamo db
Aws object storage and cdn(s3, glacier and cloud front) part 3
Databases on aws part 1
Elastic beanstalk
Identity access management (iam)

Recently uploaded (20)

PDF
NAV to Microsoft Dynamics 365 Business Central Upgrade in London UK (1).pdf
PDF
Blush & Brown Modern Minimalist eBook Workbook.pdf
PDF
Choosing the Right SIRA-Approved Access Control Systems for Your Dubai Busine...
PPTX
Expert Tree Pruning & Maintenance Services in Sydney
PDF
Must-Have Holi Gadgets for 2026 Make Your Festival Fun and Hassle-Free.pdf
PDF
Choosing an Entrepreneurial Path Based on Your Personality.pdf
PDF
Green minimalist professional Business Proposal Presentation.pdf
PPTX
The Rise of Work-from-Home Internships.pptx
PPTX
Enhancing Wastewater Treatment Efficiency with GO2™ Water Treatment Chlorine ...
PDF
Next Level User Engagement with Custom Wearable Apps.pdf
PDF
SPECIAL CRIME INVEST COMbjubgjkknnjj.pdf
PDF
Eco-Friendly Entrance Cleaning The Summer Home Reset That Keeps Dirt Out.pdf
PDF
2025 Electrician Marketing Trends Report | Destiny Marketing Solutions
PDF
Resealing and Protecting Outdoor Wood Features Before Summer Peaks.pdf
PDF
promote digital marketing services .pdf
PDF
How to Inspect Exterior Paint for Early Signs of Summer Damage.pdf
PDF
Summer Cleaning Checklist Refresh Your Home for the Warmer Months.pdf
PDF
Resume Headshots Los Angeles & LA California USA
PPTX
Photography 101 basics class presentation
PPTX
Why Outsourcing Debt Collection Saves Time and Money.pptx
NAV to Microsoft Dynamics 365 Business Central Upgrade in London UK (1).pdf
Blush & Brown Modern Minimalist eBook Workbook.pdf
Choosing the Right SIRA-Approved Access Control Systems for Your Dubai Busine...
Expert Tree Pruning & Maintenance Services in Sydney
Must-Have Holi Gadgets for 2026 Make Your Festival Fun and Hassle-Free.pdf
Choosing an Entrepreneurial Path Based on Your Personality.pdf
Green minimalist professional Business Proposal Presentation.pdf
The Rise of Work-from-Home Internships.pptx
Enhancing Wastewater Treatment Efficiency with GO2™ Water Treatment Chlorine ...
Next Level User Engagement with Custom Wearable Apps.pdf
SPECIAL CRIME INVEST COMbjubgjkknnjj.pdf
Eco-Friendly Entrance Cleaning The Summer Home Reset That Keeps Dirt Out.pdf
2025 Electrician Marketing Trends Report | Destiny Marketing Solutions
Resealing and Protecting Outdoor Wood Features Before Summer Peaks.pdf
promote digital marketing services .pdf
How to Inspect Exterior Paint for Early Signs of Summer Damage.pdf
Summer Cleaning Checklist Refresh Your Home for the Warmer Months.pdf
Resume Headshots Los Angeles & LA California USA
Photography 101 basics class presentation
Why Outsourcing Debt Collection Saves Time and Money.pptx

Security

  • 2. AWS Cloud Security 2 ▪ Cloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. ▪ An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment.
  • 3. AWS Compliance & Security 3 ▪ Security and Compliance is a shared responsibility between AWS and the customer. ▪ This shared model can help relieve customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. ▪ The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall. ▪ Customers should carefully consider the services they choose as their responsibilities vary depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations. ▪ The nature of this shared responsibility also provides the flexibility and customer control that permits the deployment. As shown in the chart below, this differentiation of responsibility is commonly referred to as Security “of” the Cloud versus Security “in” the Cloud.
  • 4. AWS Compliance & Security 4 ▪ AWS responsibility “Security of the Cloud” - AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud.This infrastructure is composed of the hardware, software, networking, and facilities that runAWS Cloud services. ▪ Customer responsibility “Security in the Cloud” – Customer responsibility will be determined by the AWS Cloud services that a customer selects.This determines the amount of configuration work the customer must perform as part of their security responsibilities. For example, services such as Amazon Elastic Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud (AmazonVPC), and Amazon S3 are categorized as Infrastructure as a Service (IaaS) and, as such, require the customer to perform all of the necessary security configuration and management tasks
  • 5. AWS Compliance & Security 5 ▪ AWS responsibility “Security of the Cloud” - AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud.This infrastructure is composed of the hardware, software, networking, and facilities that runAWS Cloud services. ▪ Customer responsibility “Security in the Cloud” – Customer responsibility will be determined by the AWS Cloud services that a customer selects.This determines the amount of configuration work the customer must perform as part of their security responsibilities. For example, services such as Amazon Elastic Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud (AmazonVPC), and Amazon S3 are categorized as Infrastructure as a Service (IaaS) and, as such, require the customer to perform all of the necessary security configuration and management tasks
  • 6. AWS Compliance & Security 6 Shared Responsibility Model
  • 7. AWS Compliance & Security 7 ▪ Inherited Controls – Controls which a customer fully inherits from AWS. – Physical and Environmental controls ▪ Shared Controls – Controls which apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infrastructure and the customer must provide their own control implementation within their use of AWS services. Examples include: – Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure, but customers are responsible for patching their guest OS and applications. – Configuration Management – AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own guest operating systems, databases, and applications. – Awareness &Training - AWS trains AWS employees, but a customer must train their own employees. ▪ Customer Specific – Controls which are solely the responsibility of the customer based on the application they are deploying within AWS services. Examples include: – Service and Communications Protection or Zone Security which may require a customer to route or zone data within specific security environments.
  • 8. AWS WAF 8 ▪ AWSWAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded toAmazon CloudFront or an Application Load Balancer. ▪ AWSWAF also lets you control access to your content. ▪ Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront or an Application Load Balancer responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). ▪ You also can configure CloudFront to return a custom error page when a request is blocked.
  • 9. AWS WAF Working 9 ▪ You use AWS WAF to control how Amazon CloudFront or an Application Load Balancer responds to web requests.You start by creating conditions, rules, and web access control lists (web ACLs).You define your conditions, combine your conditions into rules, and combine the rules into a web ACL. – Conditions ▪ Conditions define the basic characteristics that you want AWSWAF to watch for in web requests – Rules ▪ You combine conditions into rules to precisely target the requests that you want to allow, block, or count. AWSWAF provides two types of rules – Web ACLs ▪ After you combine your conditions into rules, you combine the rules into a web ACL. This is where you define an action for each rule—allow, block, or count—and a default action – A default action ▪ The default action determines whetherAWSWAF allows or blocks a request that doesn't match all the conditions in any of the rules in the web ACL.
  • 10. AWS Shield 10 ▪ AWS provides AWS Shield Standard and AWS Shield Advanced for protection against DDoS attacks. ▪ AWS Shield Standard is automatically included at no extra cost beyond what you already pay forAWSWAF and your other AWS services. ▪ For added protection against DDoS attacks, AWS offersAWS Shield Advanced. ▪ AWS Shield Advanced provides expanded DDoS attack protection for yourAmazon EC2 instances, Elastic Load Balancing load balancers, CloudFront distributions, and Route 53 hosted zones.
  • 11. AWS Shield Working 11 ▪ A distributed denial of service (DDoS) attack is an attack in which multiple compromised systems attempt to flood a target, such as a network or web application, with traffic. A DDoS attack can prevent legitimate users from accessing a service and can cause the system to crash due to the overwhelming traffic volume. ▪ AWS provides two levels of protection against DDoS attacks: AWS Shield Standard and AWS Shield Advanced. – AWS Shield Standard – AWS Shield Advanced
  • 12. AWS Shield Working 12 ▪ AWS Shield Standard – All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. – AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. – WhileAWS Shield Standard helps protect allAWS customers, you get particular benefit if you are using Amazon CloudFront and Amazon Route 53. – These services receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.
  • 13. AWS Shield Working 13 ▪ AWS Shield Advanced – For higher levels of protection against attacks targeting your web applications running on Amazon EC2, Elastic Load Balancing (ELB), CloudFront, and Route 53 resources, you can subscribe to AWS Shield Advanced. – AWS ShieldAdvanced provides expanded DDoS attack protection for these resources.
  • 14. AWS Trusted Advisor 14 ▪ Trusted Advisor provides advice about yourAWS Account in the areas of: – Cost Optimization – FaultTolerance – Performance – Service Limits – Security It highlights potential problems with the way you use AWS.
  • 15. AWS Inspector 15 ▪ Amazon Inspector checks the configuration of EC2 instances. An agent runs on EC2 instances and checks operating system patches, known vulnerabilities, and common issues.
  • 16. AWS Inspector vs Trusted Advisor 16 ▪ Trusted Advisor applies to the AWS account and AWS services ▪ Amazon Inspector applies to the content of multiple EC2 instances
  • 17. AWS Inspector vs Trusted Advisor 17 ▪ Trusted Advisor applies to the AWS account and AWS services ▪ Amazon Inspector applies to the content of multiple EC2 instances
  • 18. Summary 18 AWS Shared Security Responsibility Model

Editor's Notes

  • #7: https://aws.amazon.com/compliance/shared-responsibility-model/
  • #15: https://aws.amazon.com/blogs/aws/route53-cloudtrail-checks-for-the-aws-trusted-advisor/
  • #16: https://blog.cloudthat.com/amazon-inspector-application-security-service-in-aws-cloud/
  • #19: https://www.slideshare.net/AlertLogic/the-aws-shared-responsibility-model-presented-by-amazon-web-services